Results

By type

          2021-10-01 01:45:00,732 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-01 01:45:04,627 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-01 01:45:07.436  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-01 01:45:19.642 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-01 01:45:20.739  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-01 01:45:21.321  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-01 01:45:32.424  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 33.698 seconds (JVM running for 40.883)
2021-10-01 01:47:02.929  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-01 01:47:02.936 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-01 01:47:03.134 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-01 01:47:03.220 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-01 01:47:03.236  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-01 01:47:03.325  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-01 01:47:03.326  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-01 01:47:03.329 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-01 01:47:03.330 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 01:47:03.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-01 01:47:03.339 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-01 01:47:03.342 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-01 01:47:03.535 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-01 01:47:03.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 01:47:03.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 01:47:03.542 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 01:47:04.820  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-01 01:47:04.823  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-01 01:47:04.824 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-01 01:47:04.826 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 01:47:04.832  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-01 01:47:04.833  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-01 01:47:04.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 01:47:04.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 01:47:04.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 01:47:04.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 01:47:04.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 01:47:04.927 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 01:47:04.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 01:47:04.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 01:47:04.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 01:47:04.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-01 01:47:05.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 626468482742124130406417130065304564060680997092
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 01 01:40:55 UTC 2021
           Final Date: Wed Oct 01 01:40:54 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:6f:30:87:d0:91:fb:f6:d2:f3:e2:7c:e0:de:db:84:9c:e7:a3:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e1f6a6a21cd3a19adf0ca061ffd4f0ffdf1408b
                       8686315222c63762a3e3d45cc213533b8c9d5d14
                       549a7e8120a551e2edb276ae5d697873da8b6921
                       66689f9299caa3469ced6af2d9b29cfa7d0bdee8
                       eb0216dc8a7b39846821c1b4115f9426d900147f
                       63526506619b196d1ee0cee9c2d3d3f866f6114d
                       b96abef564a98d93e6be9783b51dd6f6806ca8a5
                       8b016c9ceaab54c58da0d63ebaa56e19f75993c8
                       8239e542411b6fa026d14bd56b8366d0633d3e05
                       a7c4e02bb570d0a335aa33df4a22b6cbb6c341a3
                       7c260b61df9a3137e17201d72ce56aa37a8b6f2d
                       736a03eebf1015d4aa039afb8b45bec30ad3d8b5
                       f67afcd8dd055bc6dfa9578d52f035126270c13b
                       456f9c4fcb4656c0587e7d5da9a636551aa1c703
                       7802e42ba9fedac7087fa481018e7bdfeb2d1d41
                       4a8d65ac7bde55c06958553d6b7e8cfd2c83270d
                       d0cc0d534f9d57fd2c3c1a865e3bdc5c7153b373
                       d096b4a11d4faf8f05d7651303784bb0e15c051c
                       60d6931b615472c35a5868a9a348d9499acfb448
                       265765a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:47:58:86:d4:db:f3:b9:60:25:ec:b0:b8:a5:0c:dc:c5:f7:90:97]
            modulus: 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
    public exponent: 10001

] 
2021-10-01 04:54:16.009  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-01 04:54:16.011 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-01 04:54:16.013 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-01 04:54:16.014 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-01 04:54:16.015  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-01 04:54:16.016  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-01 04:54:16.016  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-01 04:54:16.016 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-01 04:54:16.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-01 04:54:16.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-01 04:54:16.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-01 04:54:16.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 04:54:16.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 04:54:16.036 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 04:54:16.275  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-01 04:54:16.276  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-01 04:54:16.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-01 04:54:16.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 04:54:16.326  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-01 04:54:16.327  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-01 04:54:16.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:54:16.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:54:16.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:54:16.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:54:16.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:54:16.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:54:16.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:54:16.333 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:54:16.333 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:54:16.334 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-01 04:54:16.425 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 626468482742124130406417130065304564060680997092
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 01 01:40:55 UTC 2021
           Final Date: Wed Oct 01 01:40:54 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:6f:30:87:d0:91:fb:f6:d2:f3:e2:7c:e0:de:db:84:9c:e7:a3:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e1f6a6a21cd3a19adf0ca061ffd4f0ffdf1408b
                       8686315222c63762a3e3d45cc213533b8c9d5d14
                       549a7e8120a551e2edb276ae5d697873da8b6921
                       66689f9299caa3469ced6af2d9b29cfa7d0bdee8
                       eb0216dc8a7b39846821c1b4115f9426d900147f
                       63526506619b196d1ee0cee9c2d3d3f866f6114d
                       b96abef564a98d93e6be9783b51dd6f6806ca8a5
                       8b016c9ceaab54c58da0d63ebaa56e19f75993c8
                       8239e542411b6fa026d14bd56b8366d0633d3e05
                       a7c4e02bb570d0a335aa33df4a22b6cbb6c341a3
                       7c260b61df9a3137e17201d72ce56aa37a8b6f2d
                       736a03eebf1015d4aa039afb8b45bec30ad3d8b5
                       f67afcd8dd055bc6dfa9578d52f035126270c13b
                       456f9c4fcb4656c0587e7d5da9a636551aa1c703
                       7802e42ba9fedac7087fa481018e7bdfeb2d1d41
                       4a8d65ac7bde55c06958553d6b7e8cfd2c83270d
                       d0cc0d534f9d57fd2c3c1a865e3bdc5c7153b373
                       d096b4a11d4faf8f05d7651303784bb0e15c051c
                       60d6931b615472c35a5868a9a348d9499acfb448
                       265765a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:c3:c2:a0:80:11:a3:31:af:9d:c3:b9:b7:f6:5a:b0:26:be:90:0d]
            modulus: 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
    public exponent: 10001

] 
2021-10-01 04:55:53.864  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-01 04:55:53.866 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-01 04:55:53.867 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-01 04:55:53.868 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-01 04:55:53.869  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-01 04:55:53.870  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-01 04:55:53.870  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-01 04:55:53.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-01 04:55:53.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-01 04:55:53.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-01 04:55:53.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-01 04:55:53.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 04:55:53.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 04:55:53.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 04:55:54.026  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-01 04:55:54.028  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-01 04:55:54.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-01 04:55:54.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 04:55:54.031  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-01 04:55:54.032  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-01 04:55:54.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:55:54.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:55:54.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:55:54.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:55:54.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:55:54.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:55:54.035 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:55:54.035 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:55:54.036 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:55:54.036 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-01 04:55:54.039 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 626468482742124130406417130065304564060680997092
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 01 01:40:55 UTC 2021
           Final Date: Wed Oct 01 01:40:54 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:6f:30:87:d0:91:fb:f6:d2:f3:e2:7c:e0:de:db:84:9c:e7:a3:b5]
            modulus: cc9542d8b2fa8b696204775010776f4f32a66a86912fdf40a393f01706c773a85ea13047ac5abf0d95e945673da26010bfe7d684a2f85a3fecc03ea04f654066bc7907f46173fd7dc1933b65b1c08b15a6f3dc5393d9cd542a7e5d72ed081dceb336ce549b0f3a0e785db2e79e7c62ad05542b1bd4bc8de9db2140da647c1782d7323e3b359136289828df11d51daf7acf5556e700c4b6dccfb5ae7677b22fb0ff89fb867635e1e3432df473cbdd3239bffd694a8afc556217b999eea5b47a51433730e423fe47687376c0229761fa6e93b87b1014f672c65f79c5ed8f7af9e3e511e29d8d86d751f1082d5343a4f385dca972bd0b4579a64617970bacde91e53e1d4d0c8e5b3b3bce73b01ad3b77b3587a8c42ff6926e0d665418cf724826a9c515bb54918b5b5db3629d6da98c160e3e305d9a267e5406536af4435d614a64f78906af36af5179dd35fb18b8d96d277cb403e20e280e2272f9388fe7d2e7001214b81371e88edd211fd928cea9992bf6864f2ec8b88d5294fe71f98ce889e7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e1f6a6a21cd3a19adf0ca061ffd4f0ffdf1408b
                       8686315222c63762a3e3d45cc213533b8c9d5d14
                       549a7e8120a551e2edb276ae5d697873da8b6921
                       66689f9299caa3469ced6af2d9b29cfa7d0bdee8
                       eb0216dc8a7b39846821c1b4115f9426d900147f
                       63526506619b196d1ee0cee9c2d3d3f866f6114d
                       b96abef564a98d93e6be9783b51dd6f6806ca8a5
                       8b016c9ceaab54c58da0d63ebaa56e19f75993c8
                       8239e542411b6fa026d14bd56b8366d0633d3e05
                       a7c4e02bb570d0a335aa33df4a22b6cbb6c341a3
                       7c260b61df9a3137e17201d72ce56aa37a8b6f2d
                       736a03eebf1015d4aa039afb8b45bec30ad3d8b5
                       f67afcd8dd055bc6dfa9578d52f035126270c13b
                       456f9c4fcb4656c0587e7d5da9a636551aa1c703
                       7802e42ba9fedac7087fa481018e7bdfeb2d1d41
                       4a8d65ac7bde55c06958553d6b7e8cfd2c83270d
                       d0cc0d534f9d57fd2c3c1a865e3bdc5c7153b373
                       d096b4a11d4faf8f05d7651303784bb0e15c051c
                       60d6931b615472c35a5868a9a348d9499acfb448
                       265765a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:5e:ae:f1:72:88:64:6f:48:e9:dc:4f:dc:f6:7c:63:2d:ba:6e:11]
            modulus: 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
    public exponent: 10001

] 
2021-10-01 04:58:47.222  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-01 04:58:47.224 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-01 04:58:47.225 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-01 04:58:47.226 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-01 04:58:47.226  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-01 04:58:47.227  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-01 04:58:47.227  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-01 04:58:47.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-01 04:58:47.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-01 04:58:47.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-01 04:58:47.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-01 04:58:47.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 04:58:47.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 04:58:47.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 04:58:47.322  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-01 04:58:47.323  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-01 04:58:47.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-01 04:58:47.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 04:58:47.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-01 04:58:47.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-01 04:58:47.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:58:47.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:58:47.327 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:58:47.327 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:58:47.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:58:47.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:58:47.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:58:47.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:58:47.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:58:47.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-01 04:58:47.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 626468482742124130406417130065304564060680997092
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 01 01:40:55 UTC 2021
           Final Date: Wed Oct 01 01:40:54 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:6f:30:87:d0:91:fb:f6:d2:f3:e2:7c:e0:de:db:84:9c:e7:a3:b5]
            modulus: cc9542d8b2fa8b696204775010776f4f32a66a86912fdf40a393f01706c773a85ea13047ac5abf0d95e945673da26010bfe7d684a2f85a3fecc03ea04f654066bc7907f46173fd7dc1933b65b1c08b15a6f3dc5393d9cd542a7e5d72ed081dceb336ce549b0f3a0e785db2e79e7c62ad05542b1bd4bc8de9db2140da647c1782d7323e3b359136289828df11d51daf7acf5556e700c4b6dccfb5ae7677b22fb0ff89fb867635e1e3432df473cbdd3239bffd694a8afc556217b999eea5b47a51433730e423fe47687376c0229761fa6e93b87b1014f672c65f79c5ed8f7af9e3e511e29d8d86d751f1082d5343a4f385dca972bd0b4579a64617970bacde91e53e1d4d0c8e5b3b3bce73b01ad3b77b3587a8c42ff6926e0d665418cf724826a9c515bb54918b5b5db3629d6da98c160e3e305d9a267e5406536af4435d614a64f78906af36af5179dd35fb18b8d96d277cb403e20e280e2272f9388fe7d2e7001214b81371e88edd211fd928cea9992bf6864f2ec8b88d5294fe71f98ce889e7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e1f6a6a21cd3a19adf0ca061ffd4f0ffdf1408b
                       8686315222c63762a3e3d45cc213533b8c9d5d14
                       549a7e8120a551e2edb276ae5d697873da8b6921
                       66689f9299caa3469ced6af2d9b29cfa7d0bdee8
                       eb0216dc8a7b39846821c1b4115f9426d900147f
                       63526506619b196d1ee0cee9c2d3d3f866f6114d
                       b96abef564a98d93e6be9783b51dd6f6806ca8a5
                       8b016c9ceaab54c58da0d63ebaa56e19f75993c8
                       8239e542411b6fa026d14bd56b8366d0633d3e05
                       a7c4e02bb570d0a335aa33df4a22b6cbb6c341a3
                       7c260b61df9a3137e17201d72ce56aa37a8b6f2d
                       736a03eebf1015d4aa039afb8b45bec30ad3d8b5
                       f67afcd8dd055bc6dfa9578d52f035126270c13b
                       456f9c4fcb4656c0587e7d5da9a636551aa1c703
                       7802e42ba9fedac7087fa481018e7bdfeb2d1d41
                       4a8d65ac7bde55c06958553d6b7e8cfd2c83270d
                       d0cc0d534f9d57fd2c3c1a865e3bdc5c7153b373
                       d096b4a11d4faf8f05d7651303784bb0e15c051c
                       60d6931b615472c35a5868a9a348d9499acfb448
                       265765a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:74:5e:2c:4b:1d:44:44:4e:a8:d2:b4:59:04:02:76:38:2e:7a:c3]
            modulus: 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
    public exponent: 10001

] 
2021-10-01 04:59:23.168  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-01 04:59:23.169 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-01 04:59:23.170 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-01 04:59:23.171 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-01 04:59:23.171  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-01 04:59:23.171  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-01 04:59:23.172  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-01 04:59:23.172 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-01 04:59:23.172 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-01 04:59:23.172 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-01 04:59:23.175 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-01 04:59:23.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 04:59:23.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 04:59:23.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 04:59:23.275  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-01 04:59:23.276  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-01 04:59:23.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-01 04:59:23.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 04:59:23.278  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-01 04:59:23.279  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-01 04:59:23.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:59:23.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:59:23.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:59:23.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:59:23.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:59:23.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:59:23.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:59:23.282 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:59:23.282 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:59:23.283 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-01 04:59:23.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 626468482742124130406417130065304564060680997092
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 01 01:40:55 UTC 2021
           Final Date: Wed Oct 01 01:40:54 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:6f:30:87:d0:91:fb:f6:d2:f3:e2:7c:e0:de:db:84:9c:e7:a3:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e1f6a6a21cd3a19adf0ca061ffd4f0ffdf1408b
                       8686315222c63762a3e3d45cc213533b8c9d5d14
                       549a7e8120a551e2edb276ae5d697873da8b6921
                       66689f9299caa3469ced6af2d9b29cfa7d0bdee8
                       eb0216dc8a7b39846821c1b4115f9426d900147f
                       63526506619b196d1ee0cee9c2d3d3f866f6114d
                       b96abef564a98d93e6be9783b51dd6f6806ca8a5
                       8b016c9ceaab54c58da0d63ebaa56e19f75993c8
                       8239e542411b6fa026d14bd56b8366d0633d3e05
                       a7c4e02bb570d0a335aa33df4a22b6cbb6c341a3
                       7c260b61df9a3137e17201d72ce56aa37a8b6f2d
                       736a03eebf1015d4aa039afb8b45bec30ad3d8b5
                       f67afcd8dd055bc6dfa9578d52f035126270c13b
                       456f9c4fcb4656c0587e7d5da9a636551aa1c703
                       7802e42ba9fedac7087fa481018e7bdfeb2d1d41
                       4a8d65ac7bde55c06958553d6b7e8cfd2c83270d
                       d0cc0d534f9d57fd2c3c1a865e3bdc5c7153b373
                       d096b4a11d4faf8f05d7651303784bb0e15c051c
                       60d6931b615472c35a5868a9a348d9499acfb448
                       265765a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:4a:3e:c6:91:f0:5d:0b:2c:4a:75:56:d6:db:70:a9:83:9f:14:4f]
            modulus: d00bbbeff7abee1f42e8fe30c9b675da19c789d455a2c79dd08b50eb350c343820aeab895f632e5a2336819eb76f4dbc5554c1ae6d04d3fddfe5a39a2c91a550276e852afb2f99fb3fff74c1775a632a3b192fbd34896a1b2874bcfbd185c65d9fa2e24af7030f7c2c42b5982db5e5ab521bf8d68b36435a29dc61059acf4f102ea071ee3c7585758dbcc843cbdbd01832c5598525b2b432161a4bef9967a02d37c50f19d7de1137cf73d4f313729aee729841c79643cec37db73f24c327f946c93a11c9e23519cb5c10e97ca8fb534220f2e0a9af6a83ab631f92a36228190dd024514e51fe5b92a9b7664968a98f32abf92b1f668a7ba620da24e37a360485
    public exponent: 10001

] 
2021-10-01 04:59:55.126  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-01 04:59:55.128 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-01 04:59:55.129 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-01 04:59:55.129 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-01 04:59:55.130  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-01 04:59:55.130  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-01 04:59:55.130  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-01 04:59:55.130 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-01 04:59:55.131 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-01 04:59:55.131 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-01 04:59:55.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-01 04:59:55.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 04:59:55.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 04:59:55.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 04:59:55.220  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-01 04:59:55.221  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-01 04:59:55.221 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-01 04:59:55.221 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 04:59:55.223  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-01 04:59:55.223  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-01 04:59:55.223 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:59:55.224 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:59:55.224 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:59:55.225 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:59:55.225 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:59:55.225 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:59:55.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 04:59:55.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 04:59:55.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 04:59:55.227 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-01 04:59:55.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 626468482742124130406417130065304564060680997092
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 01 01:40:55 UTC 2021
           Final Date: Wed Oct 01 01:40:54 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:6f:30:87:d0:91:fb:f6:d2:f3:e2:7c:e0:de:db:84:9c:e7:a3:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e1f6a6a21cd3a19adf0ca061ffd4f0ffdf1408b
                       8686315222c63762a3e3d45cc213533b8c9d5d14
                       549a7e8120a551e2edb276ae5d697873da8b6921
                       66689f9299caa3469ced6af2d9b29cfa7d0bdee8
                       eb0216dc8a7b39846821c1b4115f9426d900147f
                       63526506619b196d1ee0cee9c2d3d3f866f6114d
                       b96abef564a98d93e6be9783b51dd6f6806ca8a5
                       8b016c9ceaab54c58da0d63ebaa56e19f75993c8
                       8239e542411b6fa026d14bd56b8366d0633d3e05
                       a7c4e02bb570d0a335aa33df4a22b6cbb6c341a3
                       7c260b61df9a3137e17201d72ce56aa37a8b6f2d
                       736a03eebf1015d4aa039afb8b45bec30ad3d8b5
                       f67afcd8dd055bc6dfa9578d52f035126270c13b
                       456f9c4fcb4656c0587e7d5da9a636551aa1c703
                       7802e42ba9fedac7087fa481018e7bdfeb2d1d41
                       4a8d65ac7bde55c06958553d6b7e8cfd2c83270d
                       d0cc0d534f9d57fd2c3c1a865e3bdc5c7153b373
                       d096b4a11d4faf8f05d7651303784bb0e15c051c
                       60d6931b615472c35a5868a9a348d9499acfb448
                       265765a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:83:1f:49:89:d6:63:71:fc:b2:18:e4:c2:22:d8:31:1f:63:25:a4]
            modulus: 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
    public exponent: 10001

] 
2021-10-01 05:00:29.496  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-01 05:00:29.497 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-01 05:00:29.498 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-01 05:00:29.499 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-01 05:00:29.499  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-01 05:00:29.499  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-01 05:00:29.500  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-01 05:00:29.500 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-01 05:00:29.500 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-01 05:00:29.500 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-01 05:00:29.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-01 05:00:29.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 05:00:29.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 05:00:29.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 05:00:29.620  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-01 05:00:29.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-01 05:00:29.621 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-01 05:00:29.621 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 05:00:29.622  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-01 05:00:29.622  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-01 05:00:29.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 05:00:29.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 05:00:29.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 05:00:29.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 05:00:29.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 05:00:29.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 05:00:29.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 05:00:29.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 05:00:29.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 05:00:29.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-01 05:00:29.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 626468482742124130406417130065304564060680997092
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 01 01:40:55 UTC 2021
           Final Date: Wed Oct 01 01:40:54 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:6f:30:87:d0:91:fb:f6:d2:f3:e2:7c:e0:de:db:84:9c:e7:a3:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e1f6a6a21cd3a19adf0ca061ffd4f0ffdf1408b
                       8686315222c63762a3e3d45cc213533b8c9d5d14
                       549a7e8120a551e2edb276ae5d697873da8b6921
                       66689f9299caa3469ced6af2d9b29cfa7d0bdee8
                       eb0216dc8a7b39846821c1b4115f9426d900147f
                       63526506619b196d1ee0cee9c2d3d3f866f6114d
                       b96abef564a98d93e6be9783b51dd6f6806ca8a5
                       8b016c9ceaab54c58da0d63ebaa56e19f75993c8
                       8239e542411b6fa026d14bd56b8366d0633d3e05
                       a7c4e02bb570d0a335aa33df4a22b6cbb6c341a3
                       7c260b61df9a3137e17201d72ce56aa37a8b6f2d
                       736a03eebf1015d4aa039afb8b45bec30ad3d8b5
                       f67afcd8dd055bc6dfa9578d52f035126270c13b
                       456f9c4fcb4656c0587e7d5da9a636551aa1c703
                       7802e42ba9fedac7087fa481018e7bdfeb2d1d41
                       4a8d65ac7bde55c06958553d6b7e8cfd2c83270d
                       d0cc0d534f9d57fd2c3c1a865e3bdc5c7153b373
                       d096b4a11d4faf8f05d7651303784bb0e15c051c
                       60d6931b615472c35a5868a9a348d9499acfb448
                       265765a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:69:0b:4e:2a:d3:a0:e9:68:49:73:2b:0d:59:bf:36:e9:75:07:1b]
            modulus: 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
    public exponent: 10001

] 
2021-10-01 05:01:39.975  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-01 05:01:39.976 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-01 05:01:39.978 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-01 05:01:39.978 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-01 05:01:39.979  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-01 05:01:39.979  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-01 05:01:39.979  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-01 05:01:39.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-01 05:01:39.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-01 05:01:39.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-01 05:01:40.020 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-01 05:01:40.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 05:01:40.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 05:01:40.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 05:01:40.103  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-01 05:01:40.103  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-01 05:01:40.104 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-01 05:01:40.104 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 05:01:40.120  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-01 05:01:40.120  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-01 05:01:40.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 05:01:40.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 05:01:40.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 05:01:40.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 05:01:40.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 05:01:40.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 05:01:40.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 05:01:40.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 05:01:40.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 05:01:40.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-01 05:01:40.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 626468482742124130406417130065304564060680997092
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 01 01:40:55 UTC 2021
           Final Date: Wed Oct 01 01:40:54 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:6f:30:87:d0:91:fb:f6:d2:f3:e2:7c:e0:de:db:84:9c:e7:a3:b5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e1f6a6a21cd3a19adf0ca061ffd4f0ffdf1408b
                       8686315222c63762a3e3d45cc213533b8c9d5d14
                       549a7e8120a551e2edb276ae5d697873da8b6921
                       66689f9299caa3469ced6af2d9b29cfa7d0bdee8
                       eb0216dc8a7b39846821c1b4115f9426d900147f
                       63526506619b196d1ee0cee9c2d3d3f866f6114d
                       b96abef564a98d93e6be9783b51dd6f6806ca8a5
                       8b016c9ceaab54c58da0d63ebaa56e19f75993c8
                       8239e542411b6fa026d14bd56b8366d0633d3e05
                       a7c4e02bb570d0a335aa33df4a22b6cbb6c341a3
                       7c260b61df9a3137e17201d72ce56aa37a8b6f2d
                       736a03eebf1015d4aa039afb8b45bec30ad3d8b5
                       f67afcd8dd055bc6dfa9578d52f035126270c13b
                       456f9c4fcb4656c0587e7d5da9a636551aa1c703
                       7802e42ba9fedac7087fa481018e7bdfeb2d1d41
                       4a8d65ac7bde55c06958553d6b7e8cfd2c83270d
                       d0cc0d534f9d57fd2c3c1a865e3bdc5c7153b373
                       d096b4a11d4faf8f05d7651303784bb0e15c051c
                       60d6931b615472c35a5868a9a348d9499acfb448
                       265765a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:f2:13:c4:17:4c:9f:c7:29:31:0b:ce:6d:e3:08:fb:86:cc:4f:b0]
            modulus: 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
    public exponent: 10001

] 
2021-10-01 05:02:35.849  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-01 05:02:35.850 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-01 05:02:35.851 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-01 05:02:35.852 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-01 05:02:35.852  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-01 05:02:35.852  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-01 05:02:35.852  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-01 05:02:35.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-01 05:02:35.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-01 05:02:35.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-01 05:02:35.856 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-01 05:02:35.856 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 05:02:35.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-01 05:02:35.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 05:02:35.950  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-01 05:02:35.951  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-01 05:02:35.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-01 05:02:35.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-01 05:02:35.953  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-01 05:02:35.953  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-01 05:02:35.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 05:02:35.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 05:02:35.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 05:02:35.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 05:02:35.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 05:02:35.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 05:02:35.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-01 05:02:35.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-01 05:02:35.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-01 05:02:35.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-01 05:02:35.958 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 626468482742124130406417130065304564060680997092
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 01 01:40:55 UTC 2021
           Final Date: Wed Oct 01 01:40:54 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f7:6f:30:87:d0:91:fb:f6:d2:f3:e2:7c:e0:de:db:84:9c:e7:a3:b5]
            modulus: cc9542d8b2fa8b696204775010776f4f32a66a86912fdf40a393f01706c773a85ea13047ac5abf0d95e945673da26010bfe7d684a2f85a3fecc03ea04f654066bc7907f46173fd7dc1933b65b1c08b15a6f3dc5393d9cd542a7e5d72ed081dceb336ce549b0f3a0e785db2e79e7c62ad05542b1bd4bc8de9db2140da647c1782d7323e3b359136289828df11d51daf7acf5556e700c4b6dccfb5ae7677b22fb0ff89fb867635e1e3432df473cbdd3239bffd694a8afc556217b999eea5b47a51433730e423fe47687376c0229761fa6e93b87b1014f672c65f79c5ed8f7af9e3e511e29d8d86d751f1082d5343a4f385dca972bd0b4579a64617970bacde91e53e1d4d0c8e5b3b3bce73b01ad3b77b3587a8c42ff6926e0d665418cf724826a9c515bb54918b5b5db3629d6da98c160e3e305d9a267e5406536af4435d614a64f78906af36af5179dd35fb18b8d96d277cb403e20e280e2272f9388fe7d2e7001214b81371e88edd211fd928cea9992bf6864f2ec8b88d5294fe71f98ce889e7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1e1f6a6a21cd3a19adf0ca061ffd4f0ffdf1408b
                       8686315222c63762a3e3d45cc213533b8c9d5d14
                       549a7e8120a551e2edb276ae5d697873da8b6921
                       66689f9299caa3469ced6af2d9b29cfa7d0bdee8
                       eb0216dc8a7b39846821c1b4115f9426d900147f
                       63526506619b196d1ee0cee9c2d3d3f866f6114d
                       b96abef564a98d93e6be9783b51dd6f6806ca8a5
                       8b016c9ceaab54c58da0d63ebaa56e19f75993c8
                       8239e542411b6fa026d14bd56b8366d0633d3e05
                       a7c4e02bb570d0a335aa33df4a22b6cbb6c341a3
                       7c260b61df9a3137e17201d72ce56aa37a8b6f2d
                       736a03eebf1015d4aa039afb8b45bec30ad3d8b5
                       f67afcd8dd055bc6dfa9578d52f035126270c13b
                       456f9c4fcb4656c0587e7d5da9a636551aa1c703
                       7802e42ba9fedac7087fa481018e7bdfeb2d1d41
                       4a8d65ac7bde55c06958553d6b7e8cfd2c83270d
                       d0cc0d534f9d57fd2c3c1a865e3bdc5c7153b373
                       d096b4a11d4faf8f05d7651303784bb0e15c051c
                       60d6931b615472c35a5868a9a348d9499acfb448
                       265765a1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:97:a5:6b:90:d3:3b:2a:47:41:8e:5f:3b:0e:d8:37:74:2e:ea:98]
            modulus: eced1fdda35b662bf6d9a2d5a7e6c60188990f3a8916119eddbcdce7a5e9624a040a01495307ee3f721718ce807485e40245f3b1d1b2f4552d10cc4bdd62afb4cb9e71b4c6862f06d6fc1a3684f540dc1b1cdc69c08713d4e1af96f188f9493a1df0a8ae3ac96f982c07b2941afc15197ed24b28d115be060cc0048c3a73a8372f0d3f9ef5cc7f32ea74dde8625b3bce1e60c5913b5bddd633f7b0b175e0a947e3b087a58635a9a0f94655dff789ac1e86bd6c4fdcea263f3dc2f5745de9a13d13717cfc6d78686bd01c90d32057d21eb15dfcd5c0855351cecfb376d08441e00cba41a36168e1511a785fd5fd1980a81fbe51dcdc6c1f76c52755457f9a6c3d
    public exponent: 10001

]